{"title":"Distributed Incremental Leaky LMS","authors":"M. Sowjanya, A. Sahoo, Sananda Kumar","doi":"10.1109/ICCSP.2015.7322822","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322822","url":null,"abstract":"Adaptive algorithms are applied to distributed networks to endow the network with adaptation capabilities. Incremental Strategy is the simplest mode of cooperation as it needs less amount of communication between the nodes. The adaptive incremental strategy which is developed for distributed networks using LMS algorithm, suffers from drift problem, where the parameter estimate will go unbounded in non ideal or practical implementations. Drift problem or divergence of the parameter estimate occurs due to continuous accumulation of quantization errors, finite precision errors and insufficient spectral excitation or ill conditioning of input sequence. They result in overflow and near singular auto correlation matrix, which provokes slow escape of parameter estimate to go unbound. The proposed method uses the Leaky LMS algorithm, which introduces a leakage factor in the update equation, and so prevents the weights to go unbounded by leaking energy out.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126292322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative performance evaluation of intrusion detection based on neural network and PCA","authors":"Harshal A. Sonawane, T. Pattewar","doi":"10.1109/ICCSP.2015.7322612","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322612","url":null,"abstract":"Security is the biggest challenge for the digital data of information systems and computer networks. Some systems are used for providing security to this data. Like these systems intrusion detection system (IDS) is used for providing security to computer networks and information systems. In IDS many systems uses number of techniques for providing accuracy by selecting complete features of dataset but they lagged in terms of time and memory. For real time applications time and memory is critical issue. So, there is a need of such systems which will minimize time and memory parameters. This paper presents IDS using two Methods. These both methods based on neural network. First method uses less features of dataset using Principal component Analysis (PCA) technique and second method uses complete features of dataset. Experiments are performed on these two methods using KDD Cup 99 dataset. The results simulate the effect of less featured based incomplete learning technique and complete feature based learning technique. According to the obtained results when the system usage the less features of KDD Cup 99 dataset with incomplete instances of data then the classification accuracy of model becomes less efficient as compared to the entire dataset training but it is efficient for time and memory parameters. So, Method I is beneficial for real time applications. These both systems are developed using Java technology.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on methods, issues and challenges in neuromorphic engineering","authors":"Mohammed Riyaz Ahmed, B. Sujatha","doi":"10.1109/ICCSP.2015.7322626","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322626","url":null,"abstract":"Biological systems have many key answers for our current limitations in scaling. Miniaturization and more speed were the driving forces for VLSI technology in past few decades. As we are reaching the dead end of Moore's law, now the paradigm has shifted towards intelligent machines. Many efforts are made to mimic the commonsense observed in animals. Automation and smart devices have taken a great momentum in recent years, but to imitate human intelligence in machines with existing hardware is not viable. By only developing complex algorithms and implementing software, intelligence is not accomplishable. This paper brings out the very basic differences between brain and computers. The complexity of human brain and flaws of current computing architecture is discussed. Neuromorphic Engineering emerges as a realistic solution whose architecture and circuit components resemble to their biological counterparts. This paper acts as a primer for Neuromorphic engineering. Brain functionality being analogous, the limitation of only digital systems is addressed by the mixed mode operation of ICs. Modelling of Neuron, various software and hardware available to realize these morphed architectures are studied. The gap between the software simulation and Hardware emulation, FPGA and VLSI implementation is debated. To reach to a larger audience the paper exposes many limitations of Neuromorphic engineering and come out with many open research issues.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"624 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116079407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BPCS steganography for data security using FPGA implementation","authors":"Vikas S. Kait, B. Chauhan","doi":"10.1109/ICCSP.2015.7322852","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322852","url":null,"abstract":"There are several techniques to conceal the secret information inside Cover objects; steganography is the one of them. Steganography is the art of invisible communication by concealing information inside other information. Images are the most popular cover objects for steganography. The BPCS steganography which stands for bit-plane complexity segmentation is the technique to hide secret information in some other data (carrier) with better visual imperceptibility. This technique uses the “noise-like” regions in the bit planes of the cover image to hide secret data without deteriorating the image quality. With this technique we can hide 50-60% of secrete data in the cover image. To embed the secret information inside images requires intensive computations, and therefore, the technique is implemented in an FPGA to increase the processing speed. This work presents a hardware implementation of bit-plane complexity segmentation (BPCS) steganography technique in Xilinx Spartan 3E FPGA family. To access the bit wise data on FPGA Baud rate can cause the delay.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123862309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel methodology for vehicle plate localization, segmentation, and recognition for real scenario using algorithms","authors":"D. Sathiyanarayanan, S. Shrihari, A. Veeramuthu","doi":"10.1109/ICCSP.2015.7322786","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322786","url":null,"abstract":"This paper presents time monitoring of vehicles using motion detection, vehicle tracking and number (license) plate identification technique. The time monitoring process is getting complex due to increase in the number of vehicles inside universities, colleges, companies or schools. The traffic flow at peak hours inside the campus, need to be monitored in an efficient way. Therefore, to automate this monitoring process, our objective is to detect the entry of vehicles using motion detection technique. Then capture the front portion of the vehicle as an image for preprocessing and segmentation. Finally, extracting the number plate of the vehicle using optical character recognition and log it along with the current timestamp for entry purpose. The process flow from the point of detecting the entry of vehicle to extracting the number plate data are considered to achieve an automated time monitoring system using algorithms.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single-phase feedback and scheduling algorithm for MIMO broadcast system for excelling sum-rate capacity","authors":"Barsha Barnali Panigrahi, Sagnika Sahoo, S. Singh","doi":"10.1109/ICCSP.2015.7322590","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322590","url":null,"abstract":"This work proposes a strategic single-phase feedback and scheduling algorithm basing upon semi-orthogonal user selection with zero-forcing beam forming. Zero-forcing beam- forming is a spatial signal processing method in order to avoid hindrance among users. For a downlink system, the ZFBF algorithm allows a transmitter to send data to the desired users together. This paper uses semi-orthogonal user algorithm (SUS), with the feedback of all user channel information, along a base station device. Thus, the response overhead increases significantly with the users in order to decrease the feedback load and it fully exploits the signal-to-interference-with-noise ratio (SINR) preserving orthogonality at all the stages. Accordingly, in this way a specific section of users provide feedback to their channel information. Further, the sum-rate capacity is theoretically investigated. We found that there is an improvement of sum-rate capacity considering feedback bits fixed, with an increase in the number of users.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"79 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113985203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA implementation of fully pipelined Advanced Encryption Standard","authors":"A. P. Anusha Naidu, Poorvi K. Joshi","doi":"10.1109/ICCSP.2015.7322568","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322568","url":null,"abstract":"With worldwide communication of the private and confidential data over the computing networks or internet, there is always a chance of threat of data confidentiality, data integrity and also of data availability. Information has become one of the most important assests in growing demand of need to store every single importance of events in everyday of our life. Encipherment is one of the important security mechanism to protect the data from public access. Encryption will convert the data in such a manner that only a person who has special knowledge of reading it can be able to read it. The Advanced Encryption Standard (AES) is considered to be the strongest encryption technique in cryptography. Advanced Encryption Standard (AES) is a symmetric key block cipher which will encrypt as well as decrypt the data block. Advanced Encryption Standard (AES) can be implemented in both software and hardware. As compared to software implementation hardware implementation of AES has an advantage of increased throughput and more security. In this paper we have presented the FPGA based implementation of 128-bit Advanced Encryption Standard (AES) using fully pipelined architecture. Our proposed architecture can deliver higher throughput at both encryption and decryption operations. Xilinx ISE design suite 13.1 is used for design and Spartan-3 for implementation.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122698416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a better hybrid pansharpening algorithm for high resolution satellite imagery","authors":"P. Rekha, M. Shirur","doi":"10.1109/ICCSP.2015.7322708","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322708","url":null,"abstract":"Most pansharpened images from existing algorithms are apt to present a tradeoff relationship between the spectral preservation and the spatial enhancement. In this paper, a hybrid pansharpening algorithm using neural networks based on primary and secondary high-frequency information injection method is used to efficiently improve the spatial quality of the pansharpened image is being developed. The injected high-frequency information in the proposed algorithm is the differential data of panchromatic and intensity images and the Laplacian filtered image of high frequency information are obtained with the help of regression method. The extracted high frequencies are injected by the multispectral image using the local adaptive fusion parameter and post processing of the fusion parameter. The proposed algorithm gives better spatial quality when compared to available fusion algorithms with high spectral information. MATLAB 13 [b] version is used to build a GUI to apply and to present the results of the image fusion algorithms. Subjective (visual) and objective evaluation of the fused images have been performed to evaluate the success of the approaches. The objective evaluation methods include Correlation Coefficient (CC), Root Mean Squared Error (RMSE), Relative Global Dimensional Synthesis Error (ERGAS), Relative Average Spectral Error (RASE), Degree Of Distortion (DD) and Average Gradient (AG).","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of stability augmentation system by various Flight Control laws","authors":"K. D. S. Raj, M. Mohan","doi":"10.1109/ICCSP.2015.7322579","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322579","url":null,"abstract":"An insight into the knowledge of Automatic Flight Control Systems (AFCSs) gives an understanding of the basic problem of controlling the aircraft's flight, and enhance its ability to assess the solutions to the problems which are generally proposed. Before understanding automatic controlling of an aircraft, it is essential to know how an aircraft will respond dynamically to a deliberate movement of its control surfaces, or to an encounter with unexpected and random disturbances of the air through which it is flying. With these thoughts this paper presents a reasonable self-contained account of the most significant method of designing linear control systems which find universal use in AFCSs. This paper being firmly based upon time-domain methods, presents modern methods of control theory, particularly the use of state equations which is a natural and effective technique and harmonizes with the mathematical description of the aircraft dynamics that are most completely and conveniently expressed in terms of a state and an output equation. Also this paper relate to particular modes of an AFCS, being concerned with stability augmentation system which has been implemented for the reference aircraft CHARLIE (a very large, four-engine passenger jet aircraft) at different flight conditions. SIMULINK is proposed to implement SAS's as they are important to form the innermost loop of an integrated AFCS.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of goldschmidts algorithm for floating point division and square root","authors":"Rupali Bhoyar, P. Palsodkar, Sandeep Kakde","doi":"10.1109/ICCSP.2015.7322785","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322785","url":null,"abstract":"Digital signal processing algorithms are implemented using fixed point arithmetic due to expected area and power savings. However, the recent research shows that floating point arithmetic can be used by using the reduced precision format instead of standard IEEE floating point format which will avoid the algorithm design and implementation difficulties occurs in fixed point arithmetic. In this paper, the simplified single precision floating point arithmetic is used to perform division and square root operations. Goldschmidt's algorithm is iterative algorithm and has speed advantage over other iterative algorithms. Here FMA based Goldschmidt's algorithm is used for performing division and square root.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127743244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}